The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Annualized Loss Expectancy (ALE)
Annualized Loss Expectancy (ALE): A calculation used in risk management to estimate the yearly cost of potential losses from an identified risk. It is determined by multiplying the Annual Rate of Occurrence (ARO) of an event by the Single Loss Expectancy (SLE), which is the cost of a single occurrence of that event. ALE helps organizations prioritize risks and make informed decisions about where to invest in security measures. It's calculated using the formula ALE = ARO x SLE. ARO (Annual Rate of Occurrence) - The estimated frequency at which a specific threat or event is expected to occur within a one-year period. SLE (Single Loss Expectancy) - The estimated monetary loss or impact from a single occurrence of a specific threat or event.
- Annualized Rate of Occurrence (ARO)
Annualized Rate of Occurrence (ARO): A measure used in risk assessment that estimates the likelihood of a particular security incident occurring within a given year. It's a probabilistic estimate, often based on historical data or expert judgment. By considering the ARO alongside the potential impact of an incident, organizations can better understand and manage their risk exposure, helping to prioritize security investments and mitigation strategies. If it is likely to happen 5 times a year the ARO is 5, if it is likely to happen every 5 years the ARO is 0.2.
- Anomaly
Anomaly: Refers to any event, behavior, or state that deviates from an established baseline or norm. In the context of security, an anomaly could indicate a potential security incident, such as unusual network traffic, abnormal user behavior, or unexpected changes in system configuration. Anomalies aren't necessarily malicious or negative, but they can be indicative of security issues such as malware infections, intrusion attempts, or insider threats.
- Anomaly Detection
Anomaly Detection: A technique used in security to identify unusual patterns or behaviors that may indicate a potential threat. This could involve statistical methods, machine learning algorithms, or other techniques to establish a 'normal' baseline and then identify deviations from this baseline. Anomaly detection can be used in many areas of security, from network monitoring to fraud detection to user behavior analytics. It's an essential component of many intrusion detection or protection systems (IDS/IPS) and security information and event management (SIEM) solutions.
- Anonymity
Anonymity: The state of being unidentified or untraceable within a context or a set of data. Anonymity is highly valued in various scenarios, such as whistleblowing, secure browsing, or privacy-preserving communications, as it allows individuals to interact or share information without fear of retribution or unwarranted scrutiny.
- Anonymization of data
Anonymization of data: The process of removing or obfuscating personally identifiable information from a dataset in such a way that the individuals whom the data describes remain anonymous. Techniques for data anonymization might include data masking, pseudonymization, and data shuffling. The goal is to protect individual privacy, especially in cases where data is shared or published, while still enabling useful analysis of the data.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access